Publications in Policy generation tools
- [1] Hardening OpenStack Cloud Platforms against Compute Node Compromises
- Wai-Kit Sze, Abhinav Srivastava and R. Sekar
ACM Symposium on Information, Computer and Communications Security (ASIACCS) May, 2016.
- [2] Provenance-based Integrity Protection for Windows
- Wai-Kit Sze and R. Sekar
Annual Computer Security Applications Conference (ACSAC) December, 2015.
- [3] WebSheets: Web Applications for Non-Programmers
- Riccardo Pelizzi and R. Sekar
New Security Paradigms Workshop (NSPW) September, 2015.
- [4] A Portable User-Level Approach for System-wide Integrity Protection
- Wai-Kit Sze and R. Sekar
Annual Computer Security Applications Conference (ACSAC) December, 2013.
- [5] Expanding Malware Defense by Securing Software Installations
- Weiqing Sun, R. Sekar, Zhenkai Liang and V.N. Venkatakrishnan
Detection of Intrusions, Malware and Vulnerability Analysis (DIMVA) July, 2008.
- [6] Practical Proactive Integrity Preservation: A Basis for Malware Defense
- Weiqing Sun, R. Sekar, Gaurav Poothia and Tejas Karandikar
IEEE Symposium on Security and Privacy (IEEE S&P) May, 2008.
- [7] Inferring Higher Level Policies from Firewall Rules
- Alok Tongaonkar, Niranjan Inamdar and R. Sekar
USENIX Large Installation System Administration Conference (LISA) November, 2007.
- [8] A Framework for Building Privacy-Conscious Composite Web Services
- Wei Xu, V.N. Venkatakrishnan, R. Sekar and I.V. Ramakrishnan
IEEE International Conference on Web Services (ICWS) September, 2006. (Application Services and Industry Track).
- [9] On Supporting Active User Feedback in P3P
- V.N. Venkatakrishnan, Wei Xu and Rishi Kant Sharda
Secure Knowledge Management Workshop (SKM) September, 2006.
- [10] MCC End-User Management Framework
- Secure Systems Lab
Technical Report (TR) August, 2006. Technical Report SECLAB06-01, Secure Systems Laboratory, Stony Brook University.
- [11] An Approach for Realizing Privacy-Preserving Web-Based Services (Poster)
- Wei Xu, R. Sekar, I.V. Ramakrishnan and V.N. Venkatakrishnan
14th International World Wide Web Conference (WWW) May, 2005.
- [12] A Secure Composition Framework for Trustworthy Personal Information Assistants
- V.N. Venkatakrishnan, Wei Xu, I.V. Ramakrishnan and R. Sekar
IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS) April, 2005.
- [13] Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications
- R. Sekar, V.N. Venkatakrishnan, Samik Basu, Sandeep Bhatkar and Daniel DuVarney
ACM Symposium on Operating Systems Principles (SOSP) October, 2003.
- [14] Generation of All Counter-Examples for Push-Down Systems
- Samik Basu, Diptikalyan Saha, Yow-Jian Lin and Scott Smolka
Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE) June, 2003.
- [15] An approach for Secure Software Installation
- V.N. Venkatakrishnan, R. Sekar, Sofia Tsipa, Tapan Kamat and Zhenkai Liang
USENIX Large Installation System Administration Conference (LISA) November, 2002.
- [16] Empowering mobile code using expressive security policies
- V.N. Venkatakrishnan, Ram Peri and R. Sekar
New Security Paradigms Workshop (NSPW) September, 2002.
- [17] Model-Carrying Code (MCC): A New Paradigm for Mobile-Code Security
- R. Sekar, C.R. Ramakrishnan, I.V. Ramakrishnan and Scott Smolka
New Security Paradigms Workshop (NSPW) September, 2001.
|
|